-
Notifications
You must be signed in to change notification settings - Fork 14.3k
Add exploit module for Clickjacking vulnerability in CSRF error page pfSense <= 2.4.1 #9234
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
resp.body = %Q|<!DOCTYPE html> | ||
<html> | ||
<meta charset="utf-8"> | ||
<link rel="stylesheet" type="text/css" href="//cdnjs.cloudflare.com/ajax/libs/cookieconsent2/3.0.3/cookieconsent.min.css" /> |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I don't think that we want to depend on external javascript :/
Included static content as suggested by @jvoisin |
Works as advertised:
|
Release NotesThis exploits a CSRF in pfSense that allows the attack to perform a click-jacking attack. |
I know this is already merged, but I am just curious, where in the module is the csrf click jacking page used (csrf-magic.php) as per the blog post? This looks like a csrf attack to diag_command.php, in which case, no clicky is required. |
Line 82 shows diag_command.php as the target |
huh, where? also, my point still stands. This is csrf isn't it? |
Yep, I see how its working now. My bad. |
I suppose targeting the file editor would also work, less trivial though |
This module exploits a Clickjacking vulnerability in pfSense <= 2.4.1.
pfSense is a free and open source firewall and router. It was found that the pfSense WebGUI is vulnerable to Clickjacking. By tricking an authenticated admin into interacting with a specially crafted webpage it is possible for an attacker to execute arbitrary code in the WebGUI. Since the WebGUI runs as the root user, this will result in a full compromise of the pfSense instance.
Verification
The victim should be able to access the WebGUI & must be logged in as admin in order for this exploit to work. Possibly the WebGUI's TLS certificate must be trusted in the browser.
use exploit/unix/http/pfsense_clickjacking
set TARGETURI https://<ip WebGUI>
exploit